13
By Yogeshwari.M Rubini.R

Information security

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Information security

ByYogeshwari.M

Rubini.R

Page 2: Information security

What is Information?Information is a

processed data.

In other words, a result got after processing a raw fact.

Page 3: Information security

What is Security?Dictionary.com says:

1. Freedom from risk or danger; safety.2.Freedom from doubt, anxiety, or fear; confidence.3. Something that gives or assures safety, as:

1. A group or department of private guards: Call building security if a visitor acts suspicious.2. Measures adopted by a government to prevent espionage, sabotage, or attack.3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.

…etc.

Page 4: Information security

Definition of Information SecuritySafe-guarding an

organization’s data from unauthorised access or modification to ensure its , confidentiality, integrity and availability (CIA).

The protection of information and information systems against unauthorized access or modification of information.

ConfidentialInformation& Critical Systems

Page 5: Information security

90/10 Rule

Process

Technology

People

10%

90%

Page 6: Information security

State of InternetAccording to

Internetworldstats.com, there are slightly over 1.3 billion internet users worldwide.

Approx. 19% (18.9) or 237 million from North America

That means the other 81% are from the rest of the world.

Once connected to the internet your computer is accessible to those users.

Page 7: Information security

Key to Information Security• A password is

essentially the last layer of defense to your computer and personal information.

• You can have every other safeguard in place, if someone gets your password they are now able to access the information.

Page 8: Information security

Make your Keys in private• Lock your computer

if you are going to be away from it so that anyone that wonders by cannot gain access to your computer and information.

• Don’t share password with your friends.

Page 9: Information security

Surf Safely and Choose your RISK You know there are

bad parts of town that you don’t go to…

The Internet is the same way – be wary!

And be aware of TROJANS!!

Page 10: Information security

Be Aware of Trojan• A Trojan horse is an email

virus usually released by an email attachment.

• Trojan spread from computer to computer, but unlike a virus, it has the capability to travel without any human action…

• The most common means of infection is through email attachments.

Page 11: Information security

Surf “safer” w/ SiteAdvisor

Page 12: Information security

Thank you!!!

Thank you for Giving us this GOLDEN oppourtunity!!!

Page 13: Information security

Queries???